If system failure prevents the operating system from starting on a client computer, Full Disk Encryption has these options:
If system failure prevents the operating system from starting on a client computer, you can use Full Disk Encryption Recovery Media to decrypt the computer and recover the data. Client computers send recovery files to the Endpoint Security Management Server one time during the initial deployment so that you can create recovery media if necessary. After the recovery, the files are restored as decrypted, like they were before the Full Disk Encryption installation, and the operating system can run without the Pre-boot.
After the recovery, you must install Full Disk Encryption on the computer.
Recovery Media:
Users must authenticate to the recovery media with a username and password. There are the options for which credentials to use:
You can create Full Disk Encryption recovery media that can run on a failed computer to decrypt it. Create the recovery media on the server or with an external tool.
The media can be on a CD/DVD, USB device, or REC file.
Note - Creating a recovery media on a USB flash disk formats the device and removes all previous content. |
To create recovery media from the Endpoint Security Management Server:
The Full Disk Encryption Recovery Media Tool window opens.
The target retrieves the last known recovery data that was uploaded to the server by the client.
To create recovery media from the external recovery media tool on R77.20 and higher Management:
C:\Program Files\CheckPoint\Endpoint Security\Full Disk Encryption\
UseRec.exe
and select Run as > Administrator.Use the newly created Full Disk Encryption recovery media to decrypt the failed computer.
To recover an encrypted computer:
The disk decrypts using partition keys contained in the Recovery Media.
Note - During the decryption process, the client cannot run other programs. |
Full Disk Encryption Drive Slaving Utility lets you access Full Disk Encryption protected disk drives that become corrupted as a result of an Operating System failure . The Drive Slaving Utility is hardware independent, and can access hard disks connected through USB ports.
Full Disk Encryption Dive Slaving Utility replaces older versions of Full Disk Encryption drive slaving functionality, and supports R73 and all E80.x versions. You can use the Full Disk Encryption Drive Slaving Utility instead of disk recovery.
The utility is supported in E80.60 clients and higher on E80.60 and higher management.
Notes -
|
Before you run the Full Disk Encryption Drive Slaving Utility, make sure to do these:
We recommend that you use a recovery file when you are not sure if the hard disk drive or the Full Disk Encryption internal database on your system are corrupted.
To use the Full Disk Encryption Drive Slaving Utility:
<x:>\Program files(x86)\CheckPoint\Endpoint Security\Full Disk Encryption\fde_drive_slaving.exe
Note - To unlock a protected USB connected hard disk drive, you must first start the Drive Slaving Utility, and then connect the disk drive.
The Full Disk Encryption - Drive Slaving window opens.
Unlock volume(s) authentication window opens.
After successful authentication, use Windows explorer to access the disk drive. If you fail to access the locked disk drive, use the Full Disk Encryption Recovery file, then run the Drive Slaving Utility again.
Note - To prevent data corruption, shut down the system or use a safe removal utility before you disconnect the USB connected drive. |
To access data on the hard disk of a Full Disk Encryption-protected computer without doing a Recovery, use the Dynamic Mount Utility of Full Disk Encryption. See sk108858.